{"id":360,"date":"2025-04-28T02:26:38","date_gmt":"2025-04-28T02:26:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jlowm004\/?page_id=360"},"modified":"2025-04-28T02:34:55","modified_gmt":"2025-04-28T02:34:55","slug":"career-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jlowm004\/career-page\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Jay Michael Lowmack<br>April 13, 2025<br>The Role of Social Science in the Career of a Cybersecurity Policy Analyst<br>This paper provides an in-depth look at the role of social science in the career of a Cybersecurity<br>policy professional by highlighting what is a cybersecurity policy analyst is, how social science<br>shape the work these analysts do, and by considering what effect do applying ethical and<br>sociopolitical concepts in these policy affects the development of these policies.<br>Defining what a Cybersecurity Policy Analyst does in their Career Path<br>\uf0b7 A cybersecurity policy analyst is defined as \u201ca pivotal role in an organization\u2019s defense<br>against cyber threats. Their primary responsibilities include the development,<br>implementation, and monitoring of cybersecurity policies and procedures. They also<br>assess compliance with existing regulations and industry standards, making<br>recommendations for risk management and improvement.\u201d (UMATechnology, 2025).<br>\uf0b7 The quote above highlights its key roles in policy development, implementation, and<br>monitoring of evolving technology to ensure policy effectiveness and to evaluate industry<br>standards. It also identifies potential risks and recommends ways to improve security or<br>prevent those risks from coming true.<\/p>\n\n\n\n<p>How do Social Sciences Shape the Work of these Cybersecurity Policy<br>Analysts<br>\uf0b7 Cybersecurity goes beyond just technical defenses because it needs to consider social,<br>political, and strategic implications for the development of necessary policies. Why? It<br>can bring critical insights into the role of cyber operations by influencing how policies<br>need to be shaped or implemented around evolving technological changes.<br>\uf0b7 For example, \u201cMicrosoft\u2019s intelligence products, and others like it, provide a critical<br>public service by helping to shed light on the dynamics of cyber operations in an<br>environment where the major tech players (like Microsoft) are likely to have exquisite<br>visibility on often obscured cyber activities. However, they also reveal the limitations of<br>technical intelligence reporting and the problems of drawing inferences from discrete<br>cyber activities about core concepts in the security studies field\u2014like deterrence,<br>warfighting, or the offense-defense balance\u2014absent an approach grounded in social<br>science.\u201d (Lonergan &amp; Smith, 2022).<br>\uf0b7 As stated in the quote, Microsoft intelligence products help reveal hidden cyber<br>activities, providing valuable insights into the dynamics of cyber operations. However,<br>this reliance on technology can be limited by the lack of social sciences, which are the<br>key to understanding topics like deterrence or warfare.<\/p>\n\n\n\n<p>The Effects of Ethical and Sociopolitical Concepts on the Development<br>of these Policies<br>\uf0b7 The foundation of ethical and sociopolitical policy development is essential, and to<br>understand it, you must grasp the concept of critical reflection, which plays an essential<br>role in recognizing and addressing inequalities.<br>\uf0b7 This is displayed in the following quote \u201cAcross the various frameworks, critical<br>reflection refers to (1) thinking critically about accepted assumptions, beliefs, feelings,<br>and ideas, (2) uncovering the hidden interests underlying personal, social, and cultural<br>beliefs or assumptions, (3) being able to identify root causes of inequality and ways that<br>history continues to impact present-day ways of life\u201d (Malorni et al., 2023).<br>\uf0b7 The quote shows the importance of critical reflection in policy making by encouraging<br>individuals to think more deeply about assumptions about underlying interests and<br>identify the root cause of things through their history.<br>Conclusion<br>In conclusion, a cybersecurity policy analyst plays a vital role in safeguarding an<br>organization or company against cyber threats by developing, implementing, and monitoring<br>cybersecurity policies. With the help of social science, this analyst can use those applications to<br>offer insight into how they can adapt to stay up to date with the ever-evolving technology. Also,<br>with the concepts of Ethical and sociopolitical concepts, it can be used to make a critical<br>reflection on what led to events and how they should make a policy to make sure it doesn\u2019t<br>happen again, and there are no inequalities.<\/p>\n\n\n\n<p>References<br>Lonergan, E. D., &amp; Smith, M. (2022, July 21). Want Better Cyber Policy? Talk to Social<br>Scientists. Modern War Institute -; Modern War Institute.<br>https:\/\/mwi.westpoint.edu\/want-better-cyber-policy-talk-to-social-scientists\/<br>Malorni, A., Dolan, S., Hong, A., Joseph, N., Mohamed, K., Moore, L., Phan, L., Skoglund, I.,<br>Too, I., &amp; Wittman, S. (2023). Youth sociopolitical development: A conceptual<br>framework by racial and gender minoritized youth organizers. American Journal of<br>Community Psychology, 73(3-4). https:\/\/doi.org\/10.1002\/ajcp.12729<br>UMATechnology. (2025, January 21). Cybersecurity Policy And Compliance Analyst &#8211; UMA<br>Technology. UMA Technology. https:\/\/umatechnology.org\/cybersecurity-policy-and-<br>compliance-analyst\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jay Michael LowmackApril 13, 2025The Role of Social Science in the Career of a Cybersecurity Policy AnalystThis paper provides an in-depth look at the role of social science in the career of a Cybersecuritypolicy professional by highlighting what is a cybersecurity policy analyst is, how social scienceshape the work these analysts do, and by considering&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jlowm004\/career-page\/\">Read More<\/a><\/div>\n","protected":false},"author":29866,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/360"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/users\/29866"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/360\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/360\/revisions\/372"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/media?parent=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}